Miscellaneous Flashcards

1
Q

What is AWS Import/Export?

A

Accelerates moving huge amounts of data, you send in your storage device such as a hard drive, Amazon puts your data onto AWS and sends the device back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is AWS Trusted Advisor?

A

Service which inspects your AWS environment and makes recommendations when opportunities may exist to save money, improve system performance, or close security gaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is SSL Termination supported on ELBs?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is WAF?

A

Web Application Firewall - It helps protect web applications from common exploits, working with CloudFront and ELBs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is recommended for highest security in your AWS system?

A

MFA
Communicate via SSL/TLS
Monitor user activity with CloudTrail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false: When creating a new security group, all outgoing traffic is allowed by default

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is OpsWorks?

A

Orchestration servcie that uses Chef

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does it mean that ELBs support SSL Termination?

A

ELBs handle decryption of encrypted data, so data sent from an ELB to an instance is non ecrypted, EC2 instances behind them don’t have to deal with decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you get a vulnerability scan on your AWS system?

A

You can request one from Amazon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What credentialing type is used to access AWS Management Console?

A

MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What credentialing type is used for CLI or SDK access to a EC2 Instance?

A

Access key ID and secret access key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or false: When creating a new security group, all incoming traffic is allowed by default

A

False. It is all denied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security in the cloud consists of what 4 areas?

A

Data protection
Privilege management
Infrastructure protection
Detective controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What credentialing type is used to access AWS APIs via SOAP requests?

A

X.509 certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the shared security model

A

Amazon is responsible for securing the underlying infrastructure that supports the cloud, and you are responsible for anything you put on the cloud or connect to the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Privilege Management, and how is it implemented?

A

It ensures that only authenticated and authorized users have access to resources, in the manner intended. Includes:
Access Control Lists
Role-based access controls
Password Management, such as rotation policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In what ways can Amazon initiate the movement of data between regions?

A

It can’t. Amazon will never initiate the movement of data between regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Direct Connect?

A

Allows you to connect your own equipment to AWS dedicated rack space directly, bypassing ISPs and the internet altogether

19
Q

Who is responsible for the security of AWS managed services such as DynamoDB, RSD, etc?

A

Amazon

20
Q

What is KMS?

A

Key Management Service, a managed service that lets you create and control the encryption keys used to encrypt data

21
Q

What credentialing type is used to access EC2 Instances via SSH, or cloudFront URLs?

A

Key pairs

22
Q

What is CloudFormation?

A

Service which allows you to set up an entire infrastructure in code, which can be saved and used later to create another entire infrastructure

23
Q

Describe the data protection best practices

A

Data classification should be in place before architecting security practices. Data should be classified as:
Publicly available
Available on within org
Available to section of org
Etc.
You should also develop a least privilege system so that people can only see what they need
Everything should be encrypted, both at rest and in transit

24
Q

What is used to isolate instances running on the same physical machine from each other?

A

Xen Hypervisor

25
Q

What is Amazon Elastic Container Service?

A

Amazon Elastic Container Service (ECS) is a highly scalable, high performance container management service that supports Docker containers and allows you to easily run applications on a managed cluster of Amazon EC2 instances.

26
Q

What is ECR?

A

EC2 Container Registry - A repository for storing Docker containers in AWS

27
Q

How is Amazon ECS different from AWS Elastic Beanstalk?

A

Elastic Beanstalk is ideal if you want to leverage the benefits of containers but just want the simplicity of deploying applications from development to production by uploading a container image. You can work with Amazon ECS directly if you want more fine-grained control for custom application architectures.

28
Q

Does Amazon ECS support any other container types besides Docker?

A

No

29
Q

What are ECS Tasks?

A

Tasks allow you to define a set of containers that you would like to be placed together (or part of the same placement decision), their properties, and how they may be linked. Tasks include all the information that Amazon ECS needs to make the placement decision.

30
Q

What is a service in ECS?

A

A service allows you to run and maintain a specified number (the “desired count”) of simultaneous instances of a task definition in an ECS cluster.

31
Q

What is an ECS Cluster?

A

A logical group of EC2 instances that you can place continers into

32
Q

What are the three different ways to create an ECS cluster?

A

AWS console
CLI
CloudFormation

33
Q

What is a use case for AWS Directory Service for microsoft Active Directory?

A

Microsoft AD is your best choice if you need actual Active Directory features to support AWS applications or Windows workloads, including Amazon Relational Database Service for Microsoft SQL Server. It’s also best if you want a standalone AD in the AWS Cloud that supports Office 365 or you need an LDAP directory to support your Linux applications.

34
Q

What is the use case for AD Connector?

A

AD Connector is your best choice when you want to use your existing on-premises directory with compatible AWS services.

35
Q

What is the use case for Simple AD?

A

You can use Simple AD as a standalone directory in the cloud to support Windows workloads that need basic AD features, compatible AWS applications, or to support Linux workloads that need LDAP service.

36
Q

Describe a pre-signed URL

A

A pre-signed URL gives you access to the object identified in the URL, provided that the creator of the pre-signed URL has permissions to access that object. S3 Pre-signed URLs can be used to provide a temporary 3rd party access to private objects in S3 buckets.

37
Q

What is the difference between a Dedicated Instance and a Dedicated Host?

A

You can use Dedicated Hosts and Dedicated instances to launch Amazon EC2 instances on physical servers that are dedicated for your use. An important difference between a Dedicated Host and a Dedicated instance is that a Dedicated Host gives you additional visibility and control over how instances are placed on a physical server, and you can consistently deploy your instances to the same physical server over time. As a result, Dedicated Hosts enable you to use your existing server-bound software licenses and address corporate compliance and regulatory requirements.

38
Q

What are elastic IP Addresses?

A

Public IP addresses (IPv4 only) which can be associated and disassociated with AWS Services as needed

39
Q

True or false: EIPs are limited to a single region

A

True

40
Q

how many EIPs can you have per account?

A

5

41
Q

how many EIPs can you have per account?

A

5

42
Q

How many ENIs can you have per instance?

A

Depends on instance size

43
Q

What is enhanced networking?

A

Enhanced networking provides higher bandwidth, higher packet-per-second (PPS) performance, and consistently lower inter-instance latencies.

If your packets-per-second rate appears to have reached its ceiling, you should consider moving to enhanced networking because you have likely reached the upper thresholds of the VIF driver.